You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _posts/2025-10-23-mmaler-blogpost-2-quarkus-runtime-and-framework-for-cloud-native-java.adoc
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,7 @@ These features reflect Quarkus’s dual role: it behaves like a framework during
72
72
73
73
=== Performance that matters
74
74
75
-
As described in the ACM article on application frameworks, Google's internal framework design emphasized fast startup and resilience against cascading failures.
75
+
As described in the link:https://cacm.acm.org/practice/application-frameworks/[ACM article on application frameworks], Google's internal framework design emphasized fast startup and resilience against cascading failures.
76
76
Quarkus was built with these principles in mind.
77
77
78
78
Native image generation with GraalVM enables cold starts in milliseconds and a minimal memory footprint, allowing cost-effective deployment in containers and serverless environments.
@@ -82,16 +82,16 @@ Quarkus also includes structured health checks, metrics, and tracing, thereby al
82
82
image::7-success-stories.png[alt="Real-world success stories using Quarkus", width=100%]
83
83
84
84
85
-
=== Secure by default
85
+
=== Security
86
86
87
-
Quarkus separates application logic from infrastructure concerns.
88
-
By structuring the request lifecycle with standardized handlers such as exception mappers, filters, and interceptors, it supports strong security practices:
87
+
Quarkus uses a standards-first, composable, opt-in security model.
88
+
You enable what you need and configure it for your environment:
89
89
90
-
* Secure headers and CSRF protection out of the box.
91
-
* Native support for role-based access control.
92
-
* Seamless integration with OpenID Connect providers.
90
+
* **Transport:** enable TLS for HTTPS, or terminate TLS at your ingress.
91
+
* **Authentication:** choose Basic, form-based, mTLS, or OpenID Connect (OIDC).
92
+
* **Authorization:** enforce RBAC on web endpoints with `@RolesAllowed`, `@DenyAll`, and `@PermitAll`.
93
93
94
-
Just as Google’s frameworks reduced vulnerabilities through safe APIs and typed response models, Quarkus applies similar principles by using conventions and standardized components to promote secure defaults and trusted integrations.
94
+
This keeps defaults minimal and lets you apply the right controls for each deployment.
95
95
96
96
=== Observability and control surfaces
97
97
@@ -101,7 +101,7 @@ Quarkus exposes:
101
101
102
102
* Unified logging via quarkus-logging.
103
103
* Structured metrics and tracing with Micrometer and OpenTelemetry.
104
-
* Declarative configuration via application.properties or environment overrides.
104
+
* Unified configuration of all the application's aspects via `application.properties` or environment variables.
105
105
106
106
This standardization enables automation and scalable monitoring.
0 commit comments